Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe
Resource
win7-20231215-en
General
-
Target
b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe
-
Size
101.7MB
-
MD5
1916a0852f4643bd6634b6153868e8f8
-
SHA1
276de9ea30ea7cbc414c1be9fac3c3d8c61c5b29
-
SHA256
b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67
-
SHA512
9212bd1dbe930f6334160b7ec0fe5eff9f3ef62a6eb5d488fdc4b05640c9556d435327a622201453b48eb43966ad67ce29bc927a2d94e1d857942f1086ea4ca4
-
SSDEEP
49152:Cqe3f61222222222222222222222222222222222222222222222222222222228:bSiCQxHjUd3JDcgF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.tmp -
Loads dropped DLL 1 IoCs
pid Process 2008 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2532 2008 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe 28 PID 2008 wrote to memory of 2532 2008 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe 28 PID 2008 wrote to memory of 2532 2008 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe 28 PID 2008 wrote to memory of 2532 2008 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe 28 PID 2008 wrote to memory of 2532 2008 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe 28 PID 2008 wrote to memory of 2532 2008 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe 28 PID 2008 wrote to memory of 2532 2008 b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe"C:\Users\Admin\AppData\Local\Temp\b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\is-0J0UT.tmp\b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.tmp"C:\Users\Admin\AppData\Local\Temp\is-0J0UT.tmp\b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.tmp" /SL5="$4010A,105719672,825344,C:\Users\Admin\AppData\Local\Temp\b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.exe"2⤵
- Executes dropped EXE
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-0J0UT.tmp\b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.tmp
Filesize559KB
MD5e2f03e850dc86ec87cf82ff0cad8b5e7
SHA1f52ce9a1277149f6d632d23d5fc5f70884761a13
SHA256b4e7033b7a3b9727c8cbf42ec75d7c2e7cb64e05596f7b8035d947edf25f345d
SHA5122d7ac21aff58935657c31e7e87a08377056189c9e0cbb99fa24e6cfd227d736834360a27645b7a13d9c388a477777cf774727c9c24ef82c0e677975f519827b8
-
\Users\Admin\AppData\Local\Temp\is-0J0UT.tmp\b3513c6772e4e94ea42dacbddf99235439165bb51f6ca4f3560a7482215cfa67.tmp
Filesize479KB
MD5282f0e59c66b2b13ddaa1fde43f5a7b3
SHA1b372e97dd390d9cffd348f66da90832d61b9cf38
SHA25622a4536239234c4b9478bd05172f673314eb5a7d5a5c9efee33462e36858c18d
SHA5123e68d529f68c3fd2ea96c2a7b799d588ee91a821c3ab79491f35044ecb34efa870ec74a9e1dfe986ef779a3937f63b97a985b1195028a0c8cfa4ddd449414422